Playing Attack and Defense with Trusted Storage

Javier Gonzalez, Philippe Bonnet, Luc Bouganim

    Research output: Journal Article or Conference Article in JournalConference articleResearchpeer-review

    Abstract

    It is often convenient to assume in a data management platform that one or several computing devices are trusted, specially when the goal is to provide privacy guarantees over personal data. But what does it take for a computing device to be trusted? More specifically, how can a personal device provide trusted storage? This is the question we tackle in this demonstration. We describe how secure devices, equipped with a trusted execution environment, differ from general purpose devices. We illustrate with our demonstration scenario, that it is much more difficult to attack a storage service running on a secure device, than to attack the same service running on a general purpose device.
    Original languageEnglish
    JournalITUs skriftserie
    Number of pages8
    ISSN1500-7707
    Publication statusPublished - 2014

    Keywords

    • Trusted Computing
    • Privacy Guarantees
    • Data Management
    • Secure Devices
    • Trusted Execution Environment

    Fingerprint

    Dive into the research topics of 'Playing Attack and Defense with Trusted Storage'. Together they form a unique fingerprint.

    Cite this